Sciweavers

4636 search results - page 700 / 928
» Modelling and Validation with VipTool
Sort
View
ACSC
2009
IEEE
14 years 4 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ISBI
2009
IEEE
14 years 4 months ago
Improving M/EEG Source Localization with an Inter-Condition Sparse Prior
The inverse problem with distributed dipoles models in M/EEG is strongly ill-posed requiring to set priors on the solution. Most common priors are based on a convenient ℓ2 norm....
Alexandre Gramfort, Matthieu Kowalski
ISBI
2009
IEEE
14 years 4 months ago
Detecting Maximal Directional Changes in Spatial fMRI Response Using Canonical Correlation Analysis
Traditional fMRI analysis has focused on modeling temporal changes in BOLD signals on a voxel-by-voxel basis to infer brain activation. To incorporate spatial information, we have...
Bernard Ng, Rafeef Abugharbieh, Martin McKeown
POPL
2009
ACM
14 years 4 months ago
Speculative N-Way barriers
Speculative execution is an important technique that has historically been used to extract concurrency from sequential programs. While techniques to support speculation work well ...
Lukasz Ziarek, Suresh Jagannathan, Matthew Fluet, ...
SAC
2009
ACM
14 years 4 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...